Shopping Cart

Training

Our training aims at transferring information and knowledge by accredited and experienced trainers.

Our Training Portfolio

ITIL®

Professional IT Service Management with ITIL®

Professional IT service management (ITSM) ensures that the IT infrastructure and information systems meet business and user requirements. IT service management is a key factor for a company’s success in global competition.

The most widely used framework for the conception, control, and optimization of business processes in the ITSM field is provided by the IT Infrastructure Library (ITIL®): It is an open source description of best practices, i.e. tried and tested, approved and efficient processes and strategies. Due to consistent process orientation, ITIL® is scalable and can be used in medium-sized businesses as well as major companies.

PRINCE2®

Process Oriented Project Management based on PRINCE2®

PRINCE2® (Projects in Controlled Environments) is a process based approach to project management and presents a customised and scalable method for managing all kinds of projects. The method is the de facto standard for project management in the UK and is used worldwide.

The continuous international development of PRINCE2® examinations, trainings, and course materials contribute considerably to the acknowledgement of PRINCE2® as an international standard. An increasing number of people profit from the training courses and qualifications offered worldwide.

COBIT®

Governance and Management of Information Technology

COBIT5 is an internationally accepted framework for IT management and IT governance. It provides a comprehensive body of rules with principles, practices, analytical instruments and models to govern a company’s information technology.

ISO/IEC 27001

ISO/IEC 27001

Revised and re-released in 2013, ISO 27001 builds upon established foundations as the most widely recognized international standard specifically aimed at information security management. It provides the basis for effective management of confidential and sensitive information, and for the application of information security controls.

The standard takes a business-focused approach, first enabling people to identify the context in which the business operates and its aims and objectives. It guides the organization to combine this context with a risk-based strategy to define and drive the planning, operation, maintenance and improvement of an effective Information Security Management System (ISMS).

ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) together form the body for worldwide standardization.

DevOps

DevOps

DevOps consists of a set of industry practices aimed at improving the collaboration and communication between software development and IT operations departments.

Developers and managers usually have different concepts and goals regarding productive application deployment and maintenance. These different goals and concepts can result in delays, disturbances or even failures with business relevant consequences.

DevOps provides a solution on the cultural and organisational level to address these problem areas within a company and to break down the development and operations silos. The three frameworks Scrum, ITSM and Lean are the basic blocks of DevOps.

SCRUM

Agile Project Management with Scrum

Agile project management uses an iterative and incremental process with regular communication and intensive exchange and hence differs from classic project management. This way problems can be counteracted at very short notice. The most used application for agile process models is Scrum. Scrum uses very few roles, artifacts, incidents and rules and is therefore a very lightweight process.

The project team is highly self-organised and an interdisciplinary compound. Documentation of requirements is done in User Stories, which are implemented step-by-step in short cycles, so-called Sprints. This way the progress of the project within Scrum is very transparent for all involved. The principles and best-practices of Scrum as a framework allow flexibility in coping with complex tasks.

Data Protection

The basics for data protection officers

Today we are already bound by the rules of the European Data Protection Act, which is current European Law. The 25th May 2018 marks the end of the transitional period. From this day onwards it is possible for the supervisory authorities to check the data protection processes of a company according to the EU-DSGVO, penalise infringements and issue warnings and fines.

Our seminars will give the participants an overview of the goals and processes of the EU-DSGVO, as well as a step-by-step insight into actual procedures. This way they will be able to map the procedural landscape in a data protection compliant way and act according to documentation obligations.

The seminar Data Protection Officer contains of two modules and a certified DEKRA exam can be taken at the end to obtain the certificate “Data Privacy Specialist” – both modules can be booked independently but it is mandatory for the exam after module 2 to have prior taken part in module 1.

Multi-typological Training

Our training concepts are based on modern principles of moderation, presentation, and – above all – didactics. On this basis, b-pi GmbH has developed a multi typological training concept, involving active student participation and interaction. Fast knowledge acquisition is the impressive result.